Apple plugs 16 holes in Safari as Pwn2Own looms
Browser expected to fall first in hacking contest gets fixes for critical flaws
Computerworld - Two weeks before a browser hacking contest is to kick off in Vancouver, British Columbia, Apple Inc. yesterday patched 16 vulnerabilities in Safari, 12 of them critical bugs that could be used to hijack a machine.
Apple updated Safari for both Mac OS X and Windows to Version 4.0.5, hardening the browser before it's tossed into the ring with Microsoft's Internet Explorer, Mozilla's Firefox and Google's Chrome at this year's Pwn2Own hacking challenge. The contest organizer has predicted that Safari would be the first to fall when researchers battle for $40,000 in prize money beginning March 24 at the CanSecWest security conference.
The last time that Apple refreshed Safari was in November 2009, when seven bugs were quashed with Version 4.0.4.
According to Apple's advisory, three-fourths of the vulnerabilities -- 12 of the 16 -- got Apple's "arbitrary code execution" label, meaning the flaws are critical and could be exploited to compromise a Mac or a Windows machine. Unlike other vendors, such as Microsoft and Oracle, Apple does not assign a threat ranking to the bugs it discloses.
Nine of the 16 flaws patched Thursday were in the open-source WebKit browser engine that forms the foundation of Safari; six affected only the Windows version, which runs on XP, Vista and Windows 7. Of the half-dozen Windows-only vulnerabilities, four were in the Image IO component and could be triggered by specially-crafted TIFF or BMG image files when rendered by Safari.
Two of the 16 were reported to Apple by browser rivals. Billy Rios, a browser bug researcher who formerly worked at VeriSign Inc. but now is on the Microsoft Vulnerability Research (MSVR) team, was credited with identifying one of the Windows-only flaws; Robert Swiecki of Google found one of the WebKit vulnerabilities.
The WebKit fixes may be timely. Last month, Aaron Portnoy, security research team lead with 3Com Corp.'s TippingPoint unit, the sponsor of Pwn2Own, bet that Safari would crumble at the contest in part because it's built "on the notoriously buggy WebKit."
In both 2008 and 2009, researcher Charlie Miller hacked into a Mac within minutes at Pwn2Own by exploiting an unpatched Safari vulnerability.
Safari 4.0.5 also included stability improvements for unspecified third-party browser plug-ins, performance improvements for the Top Sites feature that shows users domains they visit most often, and fixes for non-security-related bugs that affect the way the browser handles router settings and works with the iWork suite's Web-based document sharing site.
Safari 4.0.5 can be downloaded from Apple's site for Mac OS X 10.4 (Tiger), Mac OS X 10.5 (Leopard), Mac OS X 10.6 (Snow Leopard), Windows XP, Windows Vista and Windows 7. Mac OS X users will be notified of the new version automatically by the operating system's software update feature, while Windows users already running Safari will be informed by the Apple Software Update tool.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- Mozilla ships Firefox 31, adds search to new tab page
- Microsoft's IE steps back from the brink of irrelevance
- Firefox falters, falls to record low in overall browser share
- Firefox risks user backlash by adding search box to new tab page
- Google unseats Microsoft as the U.S. browser powerhouse
- Safari, Chrome push to mask URLs
- Chrome on Windows champs at the 64-bit
- Google pulls trigger, cripples some Chrome add-ons
- Microsoft shoots to shorten Internet Explorer's long tail
- Firefox risks irrelevance as mobile browsing booms
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts